Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 09 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Public Access
Modular Neural Networks for Low-Power Image Classification on Embedded Devices
Article No.: 1, Pages 1–35https://doi.org/10.1145/3408062

Embedded devices are generally small, battery-powered computers with limited hardware resources. It is difficult to run deep neural networks (DNNs) on these devices, because DNNs perform millions of operations and consume significant amounts of energy. ...

research-article
FaultDroid: An Algorithmic Approach for Fault-Induced Information Leakage Analysis
Article No.: 2, Pages 1–27https://doi.org/10.1145/3410336

Fault attacks belong to a potent class of implementation-based attacks that can compromise a crypto-device within a few milliseconds. Out of the large numbers of faults that can occur in the device, only a very few are exploitable in terms of leaking ...

research-article
Mitigating Negative Impacts of Read Disturb in SSDs
Article No.: 3, Pages 1–24https://doi.org/10.1145/3410332

Read disturb is a circuit-level noise in solid-state drives (SSDs), which may corrupt existing data in SSD blocks and then cause high read error rate and longer read latency. The approach of read refresh is commonly used to avoid read disturb errors by ...

research-article
Ising-FPGA: A Spintronics-based Reconfigurable Ising Model Solver
Article No.: 4, Pages 1–27https://doi.org/10.1145/3411511

The Ising model has been explored as a framework for modeling NP-hard problems, with several diverse systems proposed to solve it. The Magnetic Tunnel Junction– (MTJ) based Magnetic RAM is capable of replacing CMOS in memory chips. In this article, we ...

research-article
Open Access
TransNet: Minimally Supervised Deep Transfer Learning for Dynamic Adaptation of Wearable Systems
Article No.: 5, Pages 1–31https://doi.org/10.1145/3414062

Wearables are poised to transform health and wellness through automation of cost-effective, objective, and real-time health monitoring. However, machine learning models for these systems are designed based on labeled data collected, and feature ...

research-article
High-Level Synthesis of Key-Obfuscated RTL IP with Design Lockout and Camouflaging
Article No.: 6, Pages 1–35https://doi.org/10.1145/3410337

We propose three orthogonal techniques to secure Register-Transfer-Level (RTL) Intellectual Property (IP). In the first technique, the key-based RTL obfuscation scheme is proposed at an early design phase during High-Level Synthesis (HLS). Given a ...

research-article
Robust Multi-Target Sample Preparation on MEDA Biochips Obviating Waste Production
Article No.: 7, Pages 1–29https://doi.org/10.1145/3414061

Digital microfluidic biochips have fueled a paradigm shift in implementing bench-top laboratory experiments on a single tiny chip, thus replacing costly and bulky equipment. However, because of imprecise fluidic functions, several volumetric split ...

research-article
A Deterministic-Path Routing Algorithm for Tolerating Many Faults on Very-Large-Scale Network-on-Chip
Article No.: 8, Pages 1–26https://doi.org/10.1145/3414060

Very-large-scale network-on-chip (VLS-NoC) has become a promising fabric for supercomputers, but this fabric may encounter the many-fault problem. This article proposes a deterministic routing algorithm to tolerate the effects of many faults in VLS-...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.